{"id":"RHSA-2016:1087","summary":"Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.3 update","modified":"2026-03-18T11:30:18.218198Z","published":"2024-09-15T23:05:31Z","upstream":["CVE-2015-5345","CVE-2015-5346","CVE-2015-5351","CVE-2016-0706","CVE-2016-0714","CVE-2016-0763"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1087"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-US/Red_Hat_JBoss_Web_Server/3/html-single/3.0.3_Release_Notes/index.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1311076"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1311082"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1311085"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1311087"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1311089"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1311093"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JWS-271"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JWS-272"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JWS-276"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JWS-277"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JWS-303"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JWS-304"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JWS-309"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JWS-349"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JWS-350"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1087.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-5345"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-5345"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5345"},{"type":"ARTICLE","url":"http://seclists.org/bugtraq/2016/Feb/146"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-5346"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-5346"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5346"},{"type":"ARTICLE","url":"http://seclists.org/bugtraq/2016/Feb/143"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-5351"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-5351"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5351"},{"type":"ARTICLE","url":"http://seclists.org/bugtraq/2016/Feb/148"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0706"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0706"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0706"},{"type":"ARTICLE","url":"http://seclists.org/bugtraq/2016/Feb/144"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0714"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0714"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0714"},{"type":"ARTICLE","url":"http://seclists.org/bugtraq/2016/Feb/145"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0763"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0763"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0763"},{"type":"ARTICLE","url":"http://seclists.org/bugtraq/2016/Feb/147"}],"affected":[{"package":{"name":"httpd24","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/httpd24"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.6-61.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"httpd24-debuginfo","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/httpd24-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.6-61.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"httpd24-devel","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/httpd24-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.6-61.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"httpd24-manual","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/httpd24-manual"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.6-61.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"httpd24-tools","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/httpd24-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.6-61.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"mod_ldap24","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/mod_ldap24"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.6-61.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"mod_proxy24_html","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/mod_proxy24_html"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.4.6-61.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"mod_security-jws3","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/mod_security-jws3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.8.0-7.GA.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"mod_security-jws3-debuginfo","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/mod_security-jws3-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.8.0-7.GA.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"mod_session24","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/mod_session24"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.6-61.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"mod_ssl24","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/mod_ssl24"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.4.6-61.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"tomcat7","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/tomcat7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.59-50_patch_01.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"tomcat7-admin-webapps","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/tomcat7-admin-webapps"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.59-50_patch_01.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"tomcat7-docs-webapp","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/tomcat7-docs-webapp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.59-50_patch_01.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"tomcat7-el-2.2-api","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/tomcat7-el-2.2-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.59-50_patch_01.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"tomcat7-javadoc","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/tomcat7-javadoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.59-50_patch_01.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"tomcat7-jsp-2.2-api","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/tomcat7-jsp-2.2-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.59-50_patch_01.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"tomcat7-lib","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/tomcat7-lib"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.59-50_patch_01.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"tomcat7-log4j","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/tomcat7-log4j"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.59-50_patch_01.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"tomcat7-servlet-3.0-api","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/tomcat7-servlet-3.0-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.59-50_patch_01.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"tomcat7-webapps","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/tomcat7-webapps"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.0.59-50_patch_01.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"tomcat8","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/tomcat8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.18-61_patch_01.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"tomcat8-admin-webapps","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/tomcat8-admin-webapps"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.18-61_patch_01.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"tomcat8-docs-webapp","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/tomcat8-docs-webapp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.18-61_patch_01.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"tomcat8-el-2.2-api","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/tomcat8-el-2.2-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.18-61_patch_01.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"tomcat8-javadoc","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/tomcat8-javadoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.18-61_patch_01.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"tomcat8-jsp-2.3-api","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/tomcat8-jsp-2.3-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.18-61_patch_01.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"tomcat8-lib","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/tomcat8-lib"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.18-61_patch_01.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"tomcat8-log4j","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/tomcat8-log4j"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.18-61_patch_01.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"tomcat8-servlet-3.1-api","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/tomcat8-servlet-3.1-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.18-61_patch_01.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}},{"package":{"name":"tomcat8-webapps","ecosystem":"Red Hat:jboss_enterprise_web_server:3.0::el6","purl":"pkg:rpm/redhat/tomcat8-webapps"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.18-61_patch_01.ep7.el6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1087.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}